Jump to content

User:Nppatnaikm/sandbox

From Wikipedia, the free encyclopedia
Figure.1: Internet Protocol version 16 (IPv16) Datagram
Figure.2: Internet Protocol version 16 (IPv16) Classes Classification
Figure.3: Internet Protocol version 16 (IPv16) Architecture

Internet Protocol version 16 (IPv16) is an extended version of IPv4 [1] and IPv6 [2]. IPv16 introduces a new set of  IP classes [3] , IP address series, more secured data transfer [4], virtual IP address shared environment, IPv16 Datagram Format, IPv16 Classes Classification, IPv16 Architecture, Universal Wide Web (UWW) [5], and Virtual IP address. It supports current existing protocol functionalities without any interruption. Bosubabu Sambana invented IPv16 in the year 2020.

IPv16 service for allowing relates to the creation of an extended new version of Internet Protocol version 16 and its support to current technologies and future technologies too without any interruption. A New Internet Protocol version [6]  for technology up-gradation and limitless end-user connectivity and create new classes F and Class H, and Class I for extended to present classes and its performed Public, private, protected environment access with UWW [7] for at the User Level, it is performed to operate both I and H Classes for Unlimited and Infinity High Security with multicast and Virtual IP address each block connectivity for Universal users and Interstellar and Expand Universe users’ allocations[8]. This work mainly focused on IPv16 will create new technological platforms and the financial market of the entire globe due to the upgrade of new technologies and the impact of social needs to will come new technology for companies and its general financial markets and improve the global economy. IPv16 supports and gives Intelligent adopted platforms because the entire IPv16 is working based on Artificial Intelligence [9] and Blockchain technologies [10]. The significant way to identify the key access network interface requirements [11] and access configurations to provide a secure encrypted [12] effective gateway from telecommunications access multiple networks and telecommunications access components to IP networks [13] including both wired and wireless [14] [15] accesses along with Virtual IP connectivity access.

In Near Future IPv16 over IPv6 and IPv4 tunnels are widely used to connect large regional IPv16  networks because it is relatively hard to construct an International or cross-continent native relationship recommendation [16] of IPv16 network. This makes the characteristics of IPV16 of IPV16 over IPv4[4], and IPv6 [5] security tunnels [17] [18] very vital to the performance of the global IPv16 Internet operations [19].

Internet Protocol version 16 (IPv16)

[edit]

Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP) intended to succeed IPv4, which is the protocol currently used to direct almost all Internet traffic. IPv6 stands for Internet Protocol version 6 also known as IPng  [20] (IP next generation) is the second version of the Internet Protocol to be used generally across the virtual world.

The first version was IPv4. IPng was designed to take an evolutionary step from IPv4. It was not a design goal to take a radical step away from IPv4. Functions that work in IPv4 were kept in IPng [21]. Functions that didn’t work were removed. The Internet operates by transferring data between hosts in packets that are routed across networks as specified by routing protocols [22]. These packets require an addressing scheme, such as IPv4 or IPv6, to specify their source and destination addresses. Each host, computer, or other device on the Internet requires an IP address to communicate [23] .

The growth of the Internet [24] has created a need for more addresses than are possible with IPv4. Like IPv4, IPv6 is an internet-layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks. While IPv4 allows 32 bits for an IP address and therefore has 232(4 294 967 296) possible addresses, IPv6 uses 128-bit addresses for an address space of 2128 (approximately 3.4×1038) addresses.

This expansion allows for many more devices and users on the internet as well as extra flexibility in allocating addresses and efficiency for routing traffic. It also eliminates the primary need for network address translation (NAT) [25], which gained widespread deployment as an effort to alleviate IPv4 address exhaustion [26] [27].

The IPv16 is to identify the key access network interface requirements and access configurations to provide a secure encrypted effective gateway from telecommunications access multiple networks and telecommunications access components to IP networks [28] , including both wired and wireless accesses and Virtual IP connectivity access. In the near future, IPv16 over IPv6 and IPv4 tunnels will be widely used to connect large regional IPv16  networks because it is relatively hard to construct an International or cross-continent native relationship recommendation for the IPv16 network communication [29] . This makes the characteristics of IPV16 of IPV16 over IPv4 and IPv6 security tunnels very vital to the performance of the global IPv16 Internet operations [30].

Main Features

[edit]

A new Internet Protocol [31] version for technology up-gradation and limitless end-user connectivity and create new series of classes F and Class H, and Class I for extended to present IP classes and its performed Public, private, protected environment access with UWW [32] for at the User Level, it is performed to operate both I and H Classes for Unlimited an High Security with multicast and Virtual IP address each block [33] connectivity for Universal users and Interstellar and Expand Universe users’ allocations.

Mainly focused on IPv16 will create a new financial market for the entire globe due to the upgrade of new technologies and the impact of social needs to will come new technology useful for society with common man, tech industries create various new innovative fruits from this and its generate financial markets and improve the global economy too. The IPv16 is a new and extended version of Internet Protocol [34] , and it is a significant impact on existing and future technologies for mankind growing and expand identified universal facts and computer science fields and other areas too. This system collects the future of the IP protocol and also requires analysis. With new approaches for integrating connectionless services with traditional telecommunications services [35] and with new applications and businesses coming into use, likely, a new IP protocol , meeting all the new needs, including additional control requirements will be developed. The architectural implications of this have yet to be determined.

2 10 Address Space [36] along with the Bit Transfer rate of each transmission [37]. Net ID, Host ID are there, but Virtual Block ID and Created a virtual IP address. 1024.1024.1024.1024 [38] after the assigned task, to perform Virtual IP address [39] as per user requirements, and address is 1024 KB and this architecture [40] supports Updated and current technologies. New IP series of 1024.1024.1024.1024 - X-Xn [41], where X means 1,2,3,...n.

Intellectual Property (IP) Rights

[edit]

USPTO and Indian Patent Offices issued Copyright Grants (USA - TXu 2-273-973 [42] and India - L-108397/2021 [43] ) for IPv16. IPv16 Indian Patent application filed on 30 September 2021 and published in Indian Patent Journal with Application No. 202141039287 [44]  on 10 September 2021 [45], looking for a patent grant, and also filed an International PCT application PCT/IN2022/050620 [46] on 11 July 2022 and expecting publication on or before March 2023. IPv16 Internet-Draft Information (00 and 01 versions) submitted to the Internet Research Task Force  (IRTF) [47] [48] on 18 October 2021 and 08 February 2022 respectively, which is under process for RFC [49] .

[edit]

The IPv16 draft was submitted to USPTO Office in the month of August 2020. USPTO certified  on 23 July 2021 and issued copyright grant certificate TXu 2-273-973 [9] [42] with an effective date of registration  on 29 August 2021.

[edit]

IPv16 draft submitted to Copyright Office Government of India on 30 March 2021 with Diary Number 7986/2021-CO/L [43] . Copyright Office Government of India issued copyright grant certificate registration number L-108397/2021 [43] with an effective date on 13 October 2021.

Indian Patent

[edit]

The IPv16 draft was filed to Indian Patent Office on 30 September 2021 and published in Indian Patent Journal [44] with Application No. 202141039287 Journal  No. 37/2021 cited Page No. 41341 on 10 September 2021. FER reply report completed and waiting for Patent Grant.

PCT International

[edit]

IPv16 draft filed to International PCT application No. PCT/IN2022/050620 through WIPO [50] for global rights on 6 July 2022. Date of the report of the record copy by the International Bureau on 8 July 2022, and expecting publication on or before March 2023.

RFC - IRTF

[edit]

IPv16 Internet-Draft Information versions 00 and 01 were submitted [51] to the Internet Research Task Force (IRTF) on 18 October 2021 and 08 February 2022, respectively, which is under process for RFC.

Background of IPv16

[edit]

The Internet [52] is the global system of interconnected computer networks [53] that uses the Internet Protocol suite (TCP/IP) [54] to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless [55], and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web  (WWW) [56], electronic mail (e-mail) [57], telephony, and file sharing. The word internet was used as early as 1849, meaning “ interconnected or interwoven". The word Internet was used in 1974 as the shorthand form of Internetwork[58]. The Internet is in reality, a simple facilitating channel that allows many users to interconnect with many services. The Internet was used initially as a means to send an email or to communicate and transfer files. In the last few years, it has become what is best termed an electronic marketing and distribution channel. The Internet protocol suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) [59] in the late 1960s. After initiating the pioneering ARPANET [60] in 1969, DARPA started work on several other data transmission technologies.

In 1972, Robert E. Kahn [61] joined the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks and recognized the value of being able to communicate across both. In the spring of 1973, Vinton Cerf, who helped develop the existing ARPANET Network Control Program (NCP) protocol [62], joined Kahn to work on open-architecture interconnection (OSI Reference Model) [63] to design the next protocol generation for the ARPANET [60]. In 1975, a two-network IP communications test was performed between Stanford and University College London. In November 1977, a three-network IP test was conducted between sites in the US, the UK, and Norway. Several other IP prototypes were developed at multiple research centers between 1978 and 1983. Before the January 1, 1983 "Flag Day", the Internet used NCP instead of TCP as the transport layer protocol. In 1991, the IETF [64] decided that the current version of IP, called IPv4, had outlived its design. The new version of IP, called either IPng (Next Generation) or IPv6 (version 6), was the result of a long and tumultuous process that came to a head in 1994 when the IETF gave a clear direction for IPv6.

IPv6 is designed to solve the problems of IPv4 [65]. It does so by creating a new version of the protocol which serves the function of IPv4 but without t h e same limitations of IPv4. IPv6 is not different from IPv4: what you have learned in IPv4 will be valuable when you deploy IPv6. The differences between IPv6 and IPv4 are in five major areas: addressing and routing [66] , security, network address translation, administrative workload, and support for mobile devices[67]. IPv6 also includes an important feature: a set of possible migration and transition plans from IPv4. Since 1994, over 30 IPv6 RFCs have been published. Changing IP means changing dozens of Internet protocols and conventions, ranging from how IP addresses are stored in DNS (Domain Name System) and applications to how datagrams are sent and routed over Ethernet, PPP, Token Ring, FDDI, and every other medium, to how programmers call network functions.

The IETF, though, is not so insane as to assume that everyone is going to change everything overnight. So, there are also standards and protocols, and procedures for the coexistence of IPv4 and IPv6 , Tunnelling IPv6 in IPv4, tunnelling IPv4 in IPv6, running IPv4 and IPv6 on the same system (dual-stack) for an extended period, and mixing and matching the two protocols in a variety of environments.

Internet Protocol

[edit]

The Internet Protocol (IP) [68] provides for the carriage of datagrams from a source host to destination hosts, possibly passing through one or more routers and networks in the process. A datagram is a finite length packet of bits containing a header and a payload. Both hosts and routers [69]on the Internet are involved in processing IP headers. The hosts must create them and the routers must examine them to make routing decisions, and modify them as the IP packets [70] make their way from the source to the destination. TCP is a protocol designed to provide its clients at a higher layer of protocol a reliable, sequenced, flow-controlled end to end octet-stream [71] [72] . The essence of Internet facilitation and accessibility is the set of protocols available to the community to allow access by wide variety of hosts in a complex and fully distributed fashion. The protocols are at the heart of Internet success.

They are the software and system agreements that allow disparate machines and software to talk across equally disparate networks. The current protocols focus on data transactions, with some innovation allowing images and limited multimedia, namely voice and video. The future challenge will be the development of new and innovative protocols to allow both low end user access to growing while at the same time enriching the capability of the information transferred. The key underlying protocol structure that makes the Internet function is the Transport Control Protocol or Internet Protocol, TCP/IP protocol suite. This protocol allows for the easy and ready flow of data from one user to another by agreements at various levels of the network to handle, process, manage and control the underlying data packets.

Protocols such as TCP/IP [73] will be the heart of the evolution of the Internet [74]. We shall focus later on such protocols as applied to multimedia and new access methods. One can best understand the protocol evolution by looking more closely at TCP/IP [75]. The first part of the address identifies the network (NET ID) on which the host resides. The second part identifies the host (Host ID) on the given network. At the beginning of the Internet, five address classes had been defined to identify the border between Net ID and host-ID and a fixed way.

The idea of classes helps a router to decide how many bits of a given IP address identify a network number and how many bits are therefore available for host numbering in the IP classes [76]. Classes A, B, and C had been created to provide different network addresses ranges. Additionally, Class D is the range of IP multicast addresses, that is they have no topological structure. Finally, class E has been reserved for research experiments and is not used on the Internet. The usage of classes has a long tradition on the Internet and was the main reason for IP address [77] depletion which was first overcome by classless routing and NAT and finally by IPv6. The first byte (or octet) of an IP address identifies the classes, and For example, the address 205.176.253.5 is a class C address are identified.

The classful method of identifying network IDs [78] based on the given IP address class is inflexible and leads to address space depletion. Class C networks are too small for most organizations but class A and B are too large. The waste of the IP address space happened by giving class B or class A address space to customers which do not need the entire space. LANs [79] were getting bigger and bigger and logical separation of an organizations network.

Internet Protocol Architecture

[edit]

The IP security architecture (IPsec) [80] provides cryptographic protection for IP datagrams in IPv4 and IPv6 network packets. This protection can include confidentiality, strong integrity of the data, data authentication, and partial sequence integrity. Partial sequence integrity is also known as replay protection. Network architecture [81] is understood as the set of layers and layer protocols that constitute the communication system. Network architectures offer different ways of solving a critical issue when it comes to building a network: transfer data quickly and efficiently by the devices that make up the network.

The Internet protocol suite provides end-to-end data communication specifying how data should be packetized, addressed, transmitted [82] , routed, and received. This functionality is organized into four abstraction layers [83] , which classify all related protocols according to each protocol's scope of networking. From lowest to highest, the layers are the link layer, containing communication methods for data that remains within a single network segment (link) [84]; the internet layer [85], providing internetworking between independent networks; the transport layer, handling host-to-host communication; and the application layer, providing process-to-process data exchange for applications. The characteristic architecture  [86] of the Internet Protocol Suite is its broad division into operating scopes for the protocols that constitute its core functionality. The defining specification of the suite is RFC 1122, which broadly outlines four abstraction layers. These have stood the test of time, as the IETF has never modified this structure. As such a model of networking, the Internet Protocol Suite predates the OSI model [87] , a more comprehensive reference framework for general networking systems.

Internet Protocol version (IPv4)

[edit]

Internet Protocol version 4 (IPv4) [88] is the fourth version of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. Together with IPv6, it is at the core of standards-based internetworking methods of the Internet. IPv4 is still by far the most widely deployed Internet Layer protocol. It uses 32-bit addressing and allows for 4,294,967,296 unique addresses. Even though the name seems to imply that it's the fourth generation of the key Internet Protocol, version 4 of IP was the first that was widely used in modern TCP/IP [89]. IPv4, as it is sometimes called to differentiate it from the newer IPv6, is the Internet Protocol version in use on the Internet today [90], and implementation of the protocol is running on hundreds of millions of computers.

It provides the basic datagram delivery capabilities upon which all of TCP/IP [91] functions and it has proven its quality in use over more than two decades. The fifth major goal of IPv6 is VPNs, virtual private networks. The new IPSec security protocols, Encapsulating Security Protocol and Authentication header are add-ons to IPv4. IPv6 builds in and requires these protocols, which means that secure networks will be easier to build and deploy in an IPv6 world. The user wants to create unlimited IP addresses for their requirements, like 1024.1024.1024.1024 - (1 to 2 x - n) [92] . If networks are not available in the remote area, but communications are run without any delay. The Virtual IP is a node connected and verifies surrounding any network is available, then message transformation with a quantum encrypted secure channel. Unfortunately, the device was lost due to various reasons, at the same time IP address was also not used. These kinds of problems are resolved via IPv16 and millions of IP addresses to return to life. I have one IP address connected with a device. upcoming days, creating a virtual environment to IP addresses and the retrieval of entire data from their online connectivity. The same mechanism is also work to Deep Space Network Communications [93] for Interstellar galaxy Space communications [94]along with Earth communications too.

Internet Protocol version 6 (IPv6)

[edit]

Internet Protocol version 6 (IPv6) [95] is a version of the Internet Protocol (IP) intended to succeed IPv4, which is the protocol currently used to direct almost all Internet traffic [96]. IPv6 stands for Internet Protocol version 6, also known as IPng (IP next generation) [97] is the second version of the Internet Protocol to be used generally across the virtual world. The first version was IPv4 [98]. IPng was designed to take an evolutionary step from IPv4. It was not a design goal to take a radical step away from IPv4. Functions that work in IPv4 were kept in IPng. Functions that do not work were removed. The Internet operates by transferring data between hosts in packets that are routed across networks as specified by routing protocols [99].

These packets require an addressing scheme [100], such as IPv4 or IPv6, to specify their source and destination addresses. Each host, computer, or another device on the Internet requires an IP address to communicate. The growth of the Internet has created a need for more addresses than are possible with IPv4. Like IPv4, IPv6 is an internet layer protocol [101] for packet-switched internetworking [102] and provides end-to-end datagram transmission across multiple IP networks. While IPv4 allows 32 bits for an IP address and therefore has 232 (4294967296) possible addresses, IPv6 uses 128-bit addresses for an address space of 2128 addresses. This expansion allows for many more devices and users on the internet as well as extra flexibility in allocating addresses and efficiency for routing traffic [103]. It also eliminates the primary need for network address translation, which gained widespread deployment as an effort to alleviate IPv4 address exhaustion.

The significant working mechanism [104] is to identify the key access network interface requirements [105] and access configurations to provide a secure encrypted effective gateway from telecommunications access multiple networks and telecommunications access components to IP networks including both wired and wireless accesses along with Virtual IP [106] connectivity access. In Near Future IPv16 over IPv6 and IPv4 tunnels are widely used to connect large regional IPv16 networks, because it is relatively hard to construct an International or cross continent native relationship recommendation of IPv16 network. This makes the characteristics of IPV16 of IPV16 over IPv4, IPv6 security tunnels [107] very vital to performance of the global IPv16 Internet operations.

Limitation of IPv4 and IPv6

[edit]

Since the 1980 it has been apparent that the number of available IPv4 addresses is being exhausted at a rate that was not initially anticipated in the design of the network. This was the driving factor for the introduction of class full networks, for the creation of CIDR addressing [108]. But despite these measures, the IPV4 addresses are being consumed at an alarming rate and it is estimated that 2010 would be the last year for IPV4, some sources say they may last until 2012. The primary reason for IPV4 exhaustion is huge growth in the number of internet users, mobile devices using an Internet connection, and always on devices such as ADSL modems [109] and cable modems. This brings us to the development and adoption of IPV6 as an alternate solution.

Advantages of IPv16

[edit]

With such a huge address space, ISPs will have sufficient IP addresses to allocate enough addresses to every customer so that every IP device [110] has a truly unique address [111] whether it is behind a firewall or not. Network Address Translation [112] has become a very common technique to deal with the shortage of IP addresses. Unfortunately, NAT does not work very well for many Internet applications, ranging from old dependable, such as NFS and DNS [113], to newer applications such as group conferencing. NAT has also impeded business-to-businesses direct network connections, requiring baroque and elaborate address translators to make everything work reliably, scaling poorly, and offering a highly vulnerable single point of failure. One of the goals of IPv6 address space expansion [114] is to make NAT unnecessary, improving total connectivity, reliability, and flexibility.

IPv6 will re-establish transparency and end to end traffic across the Internet. The new IPv6 addresses are large and cumbersome to deal with, so IPv6 reduces [115] the number of people who have to read and write them. A second major goal of IPv6 is to reduce the total time which people have to spend configuring and managing systems [116]. An IPv6 system [117] can participate in stateless autoconfiguration, where it creates a guaranteed-unique IP address by combining its LAN MAC address [118] with a prefix provided by the network router DHCP [119] is not needed, of course, DHCP is still useful for other parameters, such as DNS servers [120], and is supported as DHCPv6 [121] where needed. IPv6 also offers a middle ground between the two extremes with protocols such as SLP (Service Location Protocol) [122] , which may make the lives of network managers easier. High bandwidth multimedia [123] and fault tolerance [124] applications are the focus of the fourth major goal of IPv6.

Multimedia applications can take advantage of multicast [125] , the transmission of a single datagram [126] to multiple receivers. Although IPv4 has some multicast capabilities [127] , these are optional, and not every router and host supports them. With IPv6, multicast is a requirement [128] . IPv6 also defines a new kind of service [129] , called anycast. Like multicast [130], anycast has groups of nodes that send and receive packets [131]. But when a packet [132] is sent to an anycast group in IPv6,it is only delivered to one of the members of the group. This new capability is especially appropriate in a fault tolerant environment [133] , web servers [134] and DNS servers [135] could all benefit from IPv6 anycast technology.

Another aspect of VPNs [136] built into IPv6 is Quality of Service [137] . IPv6 supports the same QoS features [138] as IPv4, including the DiffServ indication [139] , as well as a new 20-bit traffic flow field [140]. Although the use of this part of IPv6 is not defined, it is provided as a solid base to build QoS protocols [141] . Even Network failure or any other issues have occurred self-esteem duplicate acknowledgment sent to sender and at the same time receiver also receive the same information for end to end connectivity, in the way Intelligent self resolve mechanism to detects when the queue is processing and predict entire processing queue operations and guided supervised learning techniques and identified targeted node connectivity through Unsupervised Learning [142] techniques to resolve multiple connectivities at the same time. High investments in new IPv4 and IPv6 setups, fixes, or complex configurations for IPv4 and IPv6 (especially NATs and internal counters) should be avoided, if possible because they are investments in a technology that will slowly be phased 3 out. When you reach the point where this becomes necessary, evaluate IPv16. Whatever you invest in IPv16 is an investment in future technology.

Here the list of indicators that it may be time for you to consider or integrate IPv6 are

  • IPv4 network or NAT implementation [143] needs to be fixed or extended.
  • Connected Network are running out of address space [144].
  • Planning to prepare your connected network for applications that are based on advanced features of IPv4 and IPv6.
  • User need end-to-end security for a large number of users and you do not have the address, or user struggle with a NAT implementation [145].
  • Connected device hardware or applications reach the end of their lifecycle [146] and must be replaced. Make sure you buy products that support IPv16, even if you do not enable it right away.

The need for IPv16

[edit]

As long IPv4 and IPv6 networks do what you need them to do, let them run as well as and welcome to upgrade to new protocol version too. But when an IPv4 network hits the limits for some reason, choose IPv6. IPv6 is mature enough to be used in corporate and commercial networks, as many case studies and deployments of world wide web [147]. In the way IPv16 is the upgrade of both version works and functionalities the same, security [148] provides the same with extended Intelligent Block wise interconnectivity with genesis block [149] to end - to - end-user connectivity during the packet delivery [150] , if any Third Party or Untrusted person connect within this queue, here no chance to connect at any case due to all queue are run with an encrypted module, and internally any error raised self-driven mechanism will automatically detect and resolve this issue the same on the running queue without any interrupt.

Detailed Description of IPv16

[edit]

The IPv16 work based on similar environment of IPv6 and a better way to understanding of internal working mechanism through described is Figure 1, 2 and 3. In Near Future IPv16 over IPv6 and IPv4 tunnels are widely used to connect large regional IPv16 networks, because it is relatively hard to construct an International or cross-continent native relationship recommendation of IPv16 network. This makes the characteristics of IPV16 of IPV16 over IPv4,IPv6 security tunnels very vital to performance of the global IPv16 Internet operations [151]. Migrating from IPv16 and IPv4, IPv6 in an instant is possible because of the vast number of internet expansions and of their great users. Many organizations and Top class MNCs are becoming more and more dependent on the Internet on the Internet for their daily utilization and work, and they, therefore, cannot tolerate downtime for the replacement of the IP Protocol.

The upcoming days, there will not be one special day on which IPv6 and IPv6 will be turned off and IPv16 turned on because those protocols can coexist without any problems. The migration from IPv4, IPv6 to IPv16, must be implemented node by node by using auto-configuration [152] procedures to eliminate the need to configure the IPv16 host manually. In this way, users can immediately benefit from the many advantages of IPv16, while maintaining the possibilities of communicating with IPv6 and IPv4 users or peripherals [153]. Consequently, there is no reason to delay, updating from IPv6 to IPv16. IPv6 also defined a new kind of service, called anycast, like multicast, and proposed IPv16 is multicast [154] and Virtual IP with Unlimited and Infinity High Security with multicast and Virtual IP address each block connectivity. Universal users and Interstellar and Expand Universe users allocations.

When a packet sends from the sender to the receiver, during the packet transmission [155], and system predict cum calculating time delay, throughput, and error rate, automatically, then after colliding or interrupt occurred, immediately duplicate virtual address or packet received from a damaged packet, simultaneal information sends to sender and receiver [156]. In this session, Virtual IP plays a key role in this critical way.

IPv16 supports and enhances the same Quality of Service (QoS) [157] features as IPv4 and IPv6. IPv16 comprises creating a secure and new protocol version [158] for the Internet protocol system working based on Artificial Intelligence [159] and Blockchain Technologies [160].

  • IPv16 is the upgrade of both version works and functionalities the same, and security provides the same with extended Intelligent Block wise interconnectivity with genesis block to end-to-end user connectivity during the packet delivery [161] , if any Third Party or Untrusted person connect within this queue, here no chance to connect at any case due to all queue are run with an encrypted module, and internally any error raised self-driven mechanism will automatically detect and resolve this issue the same on the running queue without any interrupt.

Even if Network failure [162] or any other issues have occurred self-esteem duplicate acknowledgment sent to sender and at the same time receiver also receives the same information for end-to-end connectivity, in the way Intelligent self-resolve mechanism to detects when the queue is processing and predict entire processing queue operations and guided supervised learning [163] techniques and identified targeted node connectivity through Unsupervised Learning [164] techniques to resolve multiple connectivities at the same time.

  • In the Technology up-gradation, classes extensions, IP address extensions, create virtual IP address, and limitless connection through virtual IP address and holographic projection also performed.
  • Integrated with intelligent or self-driven network virtual assistance during safely packet delivery [165] IPv16 is mature enough to be used in corporate and business and universal [166] and space celestial object connectivity [167] through virtual IP addresses.
  • Deep Space communication [168] Connectivity along with Communicate Interstellar objects and Galaxies using Radio Signals [169] are integrated with the proposed architecture, and Virtual IP - IPv16 to expand the internal space communications very quickly with secured allocated channels.
  • Extension of WWW (World Wide Web) [170], and integrated with Virtual Holographic connectivity with Cryptographic Security end-to-end tunneling connectivity.
  • Create new class F and Class H and Class I for extended [171] to present classes and IP ADDRESS [172] are run single IP address inherited desired Sub-IP address [173].

IPv16 Datagram Format

[edit]

This IPv16 Datagram [174] Figure.1 [175] represents an entire basic transfer unit connected with a packet-switched network [176]. Datagrams are typically structured in header and payload sections, and they provide a connectionless communication service [177] across a packet-switched network without any interrupts. This Figure.1 shows how to interact with every operation. Initially Versions and Header length connected to types of class and Traffic classes  [178] [179] of packet transfer of every end-to-end connectivity [180], and Flow control [181] [182] working as previous versions .

IPv16 Classifications

[edit]

These IPv16 Classifications [183] Figure.2 [184] represented Current class and extension classes and integrated with Binary Bit Sequence [185] and Classes defined with First Octet Range along with default subnet Mask useful to the user level. Proposed new classes from E to I and First Octet Range from 256 to 1024 (Figure.2), here Internal loops are created until the user-required IP addresses are finished, which means the user wants to create own IP address for needed. if any PDA and Devices are lost physically but not lose IP address. The user wants to create unlimited IP addresses for their requirements, like 1024.1024.1024.1024-(1-Nx-n) [186]. For example, I have one IP address connected with One device, unfortunately, the device was lost, in the way IP address also not working. These kinds of problems are resolved by using IPv16 and save millions of IP addresses to live. In the upcoming days, we are creating a virtual environment to IP address, and the retrieval of entire data from their online connectivity.

IPv16 Architecture

[edit]

This IPv16 Architecture [187] Figure.3 [188] [189] represents the Architectural Layout [190] of various modules to internal connectivity and the entire operational procedures working mechanism [191].

  1. ^ Arkko, J.; Townsley, M. (2011-05). "IPv4 Run-Out and IPv4-IPv6 Co-Existence Scenarios". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  2. ^ Kim, Jeong-Su (2011-10-31). "IPv6 Migration, OSPFv3 Routing based on IPv6, and IPv4/IPv6 Dual-Stack Networks and IPv6 Network: Modeling, and Simulation". The KIPS Transactions:PartC. 18C (5): 343–360. doi:10.3745/kipstc.2011.18c.5.343. ISSN 1598-2858.
  3. ^ Robinson, P. (1992-10). "Suggestion for New Classes of IP Addresses". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  4. ^ Clarke, Jerry A. (1992-05-01). "Remote Data Transfer (RDT): An Interprocess Data Transfer Method for Distributed Environments". Fort Belvoir, VA. {{cite journal}}: Cite journal requires |journal= (help)
  5. ^ a b Christopher., Lampton, (1998). The World Wide Web. Watts. ISBN 0-531-20262-3. OCLC 60152289.{{cite book}}: CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link)
  6. ^ Robinson, P. (1992-10). "Suggestion for New Classes of IP Addresses". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  7. ^ "Using the World Wide Web as a Web author", World Wide Web, Abingdon, UK: Taylor & Francis, retrieved 2023-01-13
  8. ^ Kuo, Chien-Liang; Kuo, Jin-Wei; Chen, Xuan-Zhe; Yen, Li-Hsing (2022-09-28). "Learning-Based Algorithms for Channel Allocations in Wireless Mesh Network". 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS). Takamatsu, Japan: IEEE: 1–4. doi:10.23919/APNOMS56106.2022.9919974. ISBN 978-4-88552-339-7.
  9. ^ a b Kaplan, Jerry (2016-11-24), "Defining Artificial Intelligence", Artificial Intelligence, Oxford University Press, retrieved 2023-01-13
  10. ^ Bolfing, Andreas (2020-09-10), "Introduction to Blockchain Technology", Cryptographic Primitives in Blockchain Technology, Oxford University Press, pp. 199–240, retrieved 2023-01-13
  11. ^ Gagnaire, Maurice (2003). Broadband local loops for high-speed Internet access. Boston: Artech House. ISBN 1-58053-672-7. OCLC 53204856.
  12. ^ Nagelhout, Ryan (2017). Digital era encryption and decryption (First edition ed.). New York. ISBN 978-1-5081-7309-0. OCLC 967983821. {{cite book}}: |edition= has extra text (help)CS1 maint: location missing publisher (link)
  13. ^ "All-IP Networks: Introduction", Convergence Through All-IP Networks, Jenny Stanford Publishing, pp. 23–34, 2013-11-14, retrieved 2023-01-13
  14. ^ Granatstein, V. L. (2012). Physical principles of wireless communications (Second edition ed.). Boca Raton, FL: CRC Press. ISBN 1-4398-7897-8. OCLC 858926086. {{cite book}}: |edition= has extra text (help)
  15. ^ B., Tofani, Gabriel (2018). Wireless Communication. Tritech Digital Media. ISBN 978-1-64443-541-0. OCLC 1061131165.{{cite book}}: CS1 maint: multiple names: authors list (link)
  16. ^ Hoeper, K; Chen, L (2009). "Recommendation for EAP methods used in wireless network access authentication". Gaithersburg, MD. {{cite journal}}: Cite journal requires |journal= (help)
  17. ^ Chiba, J.; Murakami, Y. (1989). "Security communication in tunnels underground". Proceedings. International Carnahan Conference on Security Technology. Zurich, Switzerland: IEEE: 255–259. doi:10.1109/CCST.1989.751989.
  18. ^ Wetteroth, Debbra (2002). OSI reference model for telecommunications. New York: McGraw-Hill. ISBN 0-07-141605-6. OCLC 53448121.
  19. ^ J., Muller, Nathan (1999). Desktop encyclopedia of the Internet. Artech House. ISBN 1-58053-217-9. OCLC 45885578.{{cite book}}: CS1 maint: multiple names: authors list (link)
  20. ^ "Wireless IP Network Architectures", IP-Based Next-Generation Wireless Networks, Hoboken, NJ, USA: John Wiley & Sons, Inc., pp. 33–120, retrieved 2023-01-13
  21. ^ Chen, Hsiao-Hwa (2007). The next generation CDMA technologies. Chichester, England: John Wiley. ISBN 978-0-470-02296-2. OCLC 181349519.
  22. ^ Aweya, James (2021). IP routing protocols. Fundamentals and distance-vector routing protocols. Boca Raton, FL. ISBN 978-1-003-14904-0. OCLC 1258030839.{{cite book}}: CS1 maint: location missing publisher (link)
  23. ^ Hyung-Jin Lim; Jongpil Jeong; Chung, T.M. "Mobile IP using private IP address through stateful network address translation". The 6th International Conference on Advanced Communication Technology, 2004. IEEE. doi:10.1109/icact.2004.1292972.
  24. ^ Charles., Hulten,. Accounting for Growth in the Age of the Internet : The Importance of Output-Saving Technical Change. National Bureau of Economic Research. OCLC 1243087521.{{cite book}}: CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link)
  25. ^ Tsirtsis, G.; Srisuresh, P. (2000-02). "Network Address Translation - Protocol Translation (NAT-PT)". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  26. ^ Verfasser, Richter, Philipp. Empirical analysis of the effects and the mitigation of IPv4 address exhaustion. OCLC 1047614316. {{cite book}}: |last= has generic name (help)CS1 maint: multiple names: authors list (link)
  27. ^ Boucadair, M.; Grimault, J-L.; Lévis, P.; Villefranque, A.; Morand, P. (2009-08). "Anticipate IPv4 Address Exhaustion: A Critical Challenge for Internet Survival". 2009 First International Conference on Evolving Internet. IEEE. doi:10.1109/internet.2009.11. {{cite journal}}: Check date values in: |date= (help)
  28. ^ "All-IP Networks: Introduction", Convergence Through All-IP Networks, Jenny Stanford Publishing, pp. 23–34, 2013-11-14, retrieved 2023-01-13
  29. ^ Recommended Practice for a Serial Control and Communications Vehicle Network, SAE International, retrieved 2023-01-13
  30. ^ Laseter, Timothy M. (2012). Internet retail operations : integrating theory and practice for managers. Elliot Rabinovich (1st edition ed.). Boca Raton, Fla. ISBN 0-429-25068-1. OCLC 1295596784. {{cite book}}: |edition= has extra text (help)CS1 maint: location missing publisher (link)
  31. ^ "protocol/Internet Protocol", SpringerReference, Berlin/Heidelberg: Springer-Verlag, retrieved 2023-01-13
  32. ^ Lampton, Christopher (1997). Home page : an introduction to Web page design. New York: Franklin Watts. ISBN 0-531-20255-0. OCLC 35526274.
  33. ^ Swan, Melanie (2021). Blockchain. [S.l.]: Helion. ISBN 978-83-283-5921-5. OCLC 1228540449.
  34. ^ Robinson, P. (1992-10). "Suggestion for New Classes of IP Addresses". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  35. ^ "Telecommunications Networks and Services". 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS). Nis, Serbia: IEEE: i–i. 2021-10-20. doi:10.1109/TELSIKS52058.2021.9606312. ISBN 978-1-6654-4442-2.
  36. ^ "Tagebuch". 1925. doi:10.1007/978-3-662-33837-7. {{cite journal}}: Cite journal requires |journal= (help)
  37. ^ 1962-, Cooper, Shaun Hunter,. Enhanced available bit rate asynchronous transfer mode TCP/IP networks. OCLC 44909381. {{cite book}}: |last= has numeric name (help)CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link)
  38. ^ John., Shamim, Faraz. Morgan, Brian. Ritter, Harold. Tiso, (2002). Troubleshooting IP routing protocols. Cisco Press. OCLC 654769319.{{cite book}}: CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link)
  39. ^ Goralski, Walter (2000). IP telephony. Matthew C. Kolon. New York: McGraw-Hill. ISBN 0-585-19340-1. OCLC 45730413.
  40. ^ Seth, Sameer (2008). TCP/IP architecture, design and implementation in Linux. M. Ajaykumar Venkatesulu. Hoboken, N.J.: Wiley. ISBN 978-0-470-37783-3. OCLC 352837279.
  41. ^ Rooney, Timothy (2010). Introduction to IP address management. [Piscataway, NJ]: IEEE. ISBN 978-1-118-07381-0. OCLC 714797080.
  42. ^ a b "WebVoyage". cocatalog.loc.gov. Retrieved 2023-01-13.
  43. ^ a b c "Indian Copy Right".
  44. ^ a b "Intellectual Property India". ipindiaservices.gov.in. Retrieved 2023-01-13.
  45. ^ "Intellectual Property India". ipindiaservices.gov.in. Retrieved 2023-01-13.
  46. ^ "WIPO - Search International and National Patent Collections". patentscope.wipo.int. Retrieved 2023-01-13.
  47. ^ Falk, A. (2009-12). "Definition of an Internet Research Task Force (IRTF) Document Stream". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  48. ^ "Internet Research Task Force". irtf.org. Retrieved 2023-01-13.
  49. ^ "RFCs". IETF. Retrieved 2023-01-13.
  50. ^ "WIPO - Search International and National Patent Collections". patentscope.wipo.int. Retrieved 2023-01-13.
  51. ^ "Document Search". datatracker.ietf.org. Retrieved 2023-01-13.
  52. ^ "Acknowledgment to Reviewers of Future Internet in 2020". Future Internet. 13 (2): 28. 2021-01-24. doi:10.3390/fi13020028. ISSN 1999-5903.{{cite journal}}: CS1 maint: unflagged free DOI (link)
  53. ^ Peterson, Larry L. (2022). Computer networks : a systems approach. Bruce S. Davie (Sixth edition ed.). Cambridge, Massachusetts. ISBN 978-0-12-818200-0. OCLC 1250027855. {{cite book}}: |edition= has extra text (help)CS1 maint: location missing publisher (link)
  54. ^ "The TCP/IP Protocol Suite", Bulletproofing TCP/IP-based Windows NT/2000 Networks, Chichester, UK: John Wiley & Sons, Ltd, pp. 19–84, 2001-10-05, ISBN 978-0-470-84160-0, retrieved 2023-01-13
  55. ^ F., Molisch, Andreas (2022). Wireless Communications. Wiley-Blackwell. ISBN 978-1-119-11817-6. OCLC 1354575109.{{cite book}}: CS1 maint: multiple names: authors list (link)
  56. ^ Christopher., Lampton, (1998). The World Wide Web. Watts. ISBN 0-531-20262-3. OCLC 60152289.{{cite book}}: CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link)
  57. ^ Postal Services. Hybrid Mail. Functional Specification for postal registered electronic mail, BSI British Standards, retrieved 2023-01-13
  58. ^ author., Bethea, Nikole Brooks,. How does the internet work?. ISBN 978-1-64128-887-3. OCLC 1083185123. {{cite book}}: |last= has generic name (help)CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link)
  59. ^ Agency., United States. Defense Advanced Research Projects. Defense Advanced Research Projects Agency. Defense Advanced Research Projects Agency. OCLC 700433619.
  60. ^ a b "ARPANET", The SAGE Encyclopedia of the Internet, 2455 Teller Road, Thousand Oaks, California 91320: SAGE Publications, Inc., 2018, retrieved 2023-01-13 {{citation}}: no-break space character in |place= at position 18 (help)CS1 maint: location (link)
  61. ^ Erwin, Charlotte; Levi, Erik (2001). Kahn, Robert. Oxford Music Online. Oxford University Press.
  62. ^ McKenzie, A.M. (1976-04). "Host-Host Protocol for an ARPANET-Type Network". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  63. ^ "OSI Model", Fiber Optic Data Communication, Elsevier, p. 491, 2002, retrieved 2023-01-13
  64. ^ Force, Internet Engineering Task. IETF journal. OCLC 643129836.
  65. ^ Hagen, Silvia (2014). IPv6 essentials (3rd ed ed.). Sebastopol, CA: O'Reilly Media. ISBN 978-1-4493-3526-7. OCLC 881832733. {{cite book}}: |edition= has extra text (help)
  66. ^ Wetteroth, Debbra (2002). OSI reference model for telecommunications. New York: McGraw-Hill. ISBN 0-07-141605-6. OCLC 53448121.
  67. ^ "Mobile devices", Foundation Flash Applications for Mobile Devices, Berkeley, CA: Apress, pp. 17–41, ISBN 978-1-59059-558-9, retrieved 2023-01-13
  68. ^ Verfasser, Blank, Andrew G. TCP/IP JumpStart Internet Protocol Basics. ISBN 978-0-7821-5228-9. OCLC 899173341. {{cite book}}: |last= has generic name (help)CS1 maint: multiple names: authors list (link)
  69. ^ "Representative Standards Organizations: the OSI Reference Model", Understanding Data Communications, Chichester, UK: John Wiley & Sons, Ltd, pp. 159–181, retrieved 2023-01-13
  70. ^ Simpson, Wes (2008), "From Video into IP Packets", Video Over IP, Elsevier, pp. 155–180, retrieved 2023-01-13
  71. ^ "Representative Standards Organizations: the OSI Reference Model", Understanding Data Communications, Chichester, UK: John Wiley & Sons, Ltd, pp. 159–181, retrieved 2023-01-13
  72. ^ Kube, Michael (2001). Octet. Oxford Music Online. Oxford University Press.
  73. ^ "The TCP/IP Protocol Suite", Bulletproofing TCP/IP-based Windows NT/2000 Networks, Chichester, UK: John Wiley & Sons, Ltd, pp. 19–84, 2001-10-05, ISBN 978-0-470-84160-0, retrieved 2023-01-13
  74. ^ Ghernaouti, Solange (2017). Internet. Arnaud Dufour (12e édition mise à jour ed.). Paris. ISBN 978-2-13-079500-1. OCLC 990166328.{{cite book}}: CS1 maint: location missing publisher (link)
  75. ^ Ghernaouti, Solange (2017). Internet. Arnaud Dufour (12e édition mise à jour ed.). Paris. ISBN 978-2-13-079500-1. OCLC 990166328.{{cite book}}: CS1 maint: location missing publisher (link)
  76. ^ Robinson, P. (1992-10). "Suggestion for New Classes of IP Addresses". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  77. ^ Rooney, Timothy (2010). Introduction to IP address management. [Piscataway, NJ]: IEEE. ISBN 978-1-118-07381-0. OCLC 714797080.
  78. ^ "The digital ID case". Network Security. 1995 (10): 4. 1995-10. doi:10.1016/1353-4858(95)90263-5. ISSN 1353-4858. {{cite journal}}: Check date values in: |date= (help)
  79. ^ McNamara, John E. (1985), "Extending local area networks", Local Area Networks, Elsevier, pp. 103–114, retrieved 2023-01-13
  80. ^ Ertekin, E.; Christou, C.; Bormann, C. (2010-05). "IPsec Extensions to Support Robust Header Compression over IPsec". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  81. ^ "Figure 3: (1) Deep neural network architecture. (2) Convolutional neural network architecture. (3) Long short-term memory architecture. (4) Hybrid model (CNN-LSTM) architecture". dx.doi.org. Retrieved 2023-01-13.
  82. ^ Korobkov, Ilya (2012-04). "SpaceWire network performance evaluation during the streaming STP data transmition". 2012 11th Conference of Open Innovations Association (FRUCT). St. Petersburg: IEEE: 71–77. doi:10.23919/FRUCT.2012.8253109. ISBN 978-5-8088-0707-5. {{cite journal}}: Check date values in: |date= (help)
  83. ^ "Representative Standards Organizations: the OSI Reference Model", Understanding Data Communications, Chichester, UK: John Wiley & Sons, Ltd, pp. 159–181, retrieved 2023-01-13
  84. ^ "A single segment network", TCP/IP Essentials, Cambridge University Press, pp. 43–60, 2004-11-18, retrieved 2023-01-13
  85. ^ Minoli, Daniel (1999). Internet architectures. Andrew Schmidt. New York: Wiley. ISBN 0-471-19081-0. OCLC 39724233.
  86. ^ Minoli, Daniel (1999). Internet architectures. Andrew Schmidt. New York: Wiley. ISBN 0-471-19081-0. OCLC 39724233.
  87. ^ "OSI Model", Fiber Optic Data Communication, Elsevier, p. 491, 2002, retrieved 2023-01-13
  88. ^ Arkko, J.; Townsley, M. (2011-05). "IPv4 Run-Out and IPv4-IPv6 Co-Existence Scenarios". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  89. ^ "The TCP/IP Protocol Suite", Bulletproofing TCP/IP-based Windows NT/2000 Networks, Chichester, UK: John Wiley & Sons, Ltd, pp. 19–84, 2001-10-05, doi:10.1002/0470841605.ch2, ISBN 978-0-470-84160-0, retrieved 2023-01-13
  90. ^ Cailloux, J. M. (1989). OSI model for library applications : a tutorial. C. Casimir, Information Industries, and Innovation Commission of the European Communities. Directorate-General for Telecommunications. Luxembourg: Commission of the European Communities, Directorate-General Telecommunications, Information Industries and Innovation. ISBN 92-826-0923-5. OCLC 35468780.
  91. ^ Held, Gilbert (2001). Bulletproofing TCP/IP-based Windows NT/2000 networks. Chichester [England]: John Wiley. ISBN 0-470-85227-5. OCLC 51814021.
  92. ^ Rooney, Timothy (2010). Introduction to IP address management. [Piscataway, NJ]: IEEE. ISBN 978-1-118-07381-0. OCLC 714797080.
  93. ^ Taylor, Jim (2016-07-29), Taylor, Jim (ed.), "The Deep Space Network: A Functional Description", Deep Space Communications (1 ed.), Wiley, pp. 15–35, doi:10.1002/9781119169079.ch2, ISBN 978-1-119-16902-4, retrieved 2023-01-13
  94. ^ Wu, William W (2006-09). "Future Satellite & Space Communications". 2006 International Workshop on Satellite and Space Communications: 275–276. doi:10.1109/IWSSC.2006.256044. {{cite journal}}: Check date values in: |date= (help)
  95. ^ Netzwerke : IPv6 - Internet Protocol Version 6 : HERDT BuchPlus. Joachim Kohlmorgen, Klaus Fichtner, Daniel Hemmling, HERDT-Verlag für Bildungsmedien GmbH (3. Ausgabe ed.). Bodenheim. 2017-10. ISBN 978-3-86249-749-2. OCLC 1021406100. {{cite book}}: Check date values in: |date= (help)CS1 maint: others (link)
  96. ^ "Internet traffic management - the ISP perspective", Network Congestion Control, Chichester, UK: John Wiley & Sons, Ltd, pp. 181–198, 2006-05-04, ISBN 978-0-470-02531-4, retrieved 2023-01-13
  97. ^ "Wireless IP Network Architectures", IP-Based Next-Generation Wireless Networks, Hoboken, NJ, USA: John Wiley & Sons, Inc., pp. 33–120, retrieved 2023-01-13
  98. ^ Arkko, J.; Townsley, M. (2011-05). "IPv4 Run-Out and IPv4-IPv6 Co-Existence Scenarios". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  99. ^ Routing protocols companion guide. Cisco Networking Academy Program. Indianapolis, Ind.: Cisco Press. 2014. ISBN 978-0-13-347631-6. OCLC 872140200.{{cite book}}: CS1 maint: others (link)
  100. ^ Graham, Buck (2001). TCP/IP addressing : designing and optimizing your IP addressing scheme (2nd ed ed.). San Diego: Academic Press. ISBN 0-12-295021-6. OCLC 45220750. {{cite book}}: |edition= has extra text (help)
  101. ^ IPng, Internet protocol next generation. Scott O. Bradner, Allison Mankin. Reading, Mass.: Addison-Wesley Pub. Co. 1996. ISBN 0-201-63395-7. OCLC 32970276.{{cite book}}: CS1 maint: others (link)
  102. ^ "Internetworking in packet switched communications : first report on the RSRE-ARPA collaborative program | WorldCat.org". www.worldcat.org. Retrieved 2023-01-13.
  103. ^ "Traffic Networks: Dynamic Traffic Routing, Assignment, and Assessment", SpringerReference, Berlin/Heidelberg: Springer-Verlag, retrieved 2023-01-13
  104. ^ Poddar, Tushar (2006). The monetary transmission mechanism in Jordan. Randa Sab, Hasmik Khachatryan, International Monetary Fund. Middle East and Central Asia Department. [Washington, D.C.]: International Monetary Fund, Middle East and Central Asia Dept. ISBN 1-283-51375-7. OCLC 694141237.
  105. ^ Road vehicles. Automotive multimedia interface, BSI British Standards, retrieved 2023-01-13
  106. ^ Ravindran, Ravishankar. Topology abstraction service for IP virtual private networks (Thesis). Carleton University.
  107. ^ Beijnum, Iljitsch van (2006). Running IPv6. Berkeley, CA: Apress. ISBN 1-59059-527-0. OCLC 84849129.
  108. ^ Held, Gilbert (2002). The ABCs of IP addressing (1st edition ed.). Boca Raton, Fla. ISBN 0-429-13325-1. OCLC 1295609940. {{cite book}}: |edition= has extra text (help)CS1 maint: location missing publisher (link)
  109. ^ Regan, Tim (2015), "ADSL modems that yield long reach and fast data rates", Analog Circuit Design, Elsevier, pp. 1085–1086, retrieved 2023-01-13
  110. ^ Dawson, Martin (2007). IP location. James Winterbottom, Martin Thomson. New York, N.Y.: Mcgraw-Hill. ISBN 978-0-07-226377-0. OCLC 76941839.
  111. ^ Dawson, Martin (2007). IP location. James Winterbottom, Martin Thomson. New York, N.Y.: Mcgraw-Hill. ISBN 978-0-07-226377-0. OCLC 76941839.
  112. ^ Tsirtsis, G.; Srisuresh, P. (2000-02). "Network Address Translation - Protocol Translation (NAT-PT)". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  113. ^ Dickinson, J.; Hague, J.; Dickinson, S.; Manderson, T.; Bond, J. (2019-09). "Compacted-DNS (C-DNS): A Format for DNS Packet Capture". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  114. ^ Li Ruitao; Bo, Wang; Liang, Wu (2007-08). "Expansion on Register Address Space of VXIbus Device and It's Application". 2007 8th International Conference on Electronic Measurement and Instruments. IEEE. doi:10.1109/icemi.2007.4350608. {{cite journal}}: Check date values in: |date= (help)
  115. ^ Kim, Jeong-Su (2011-10-31). "IPv6 Migration, OSPFv3 Routing based on IPv6, and IPv4/IPv6 Dual-Stack Networks and IPv6 Network: Modeling, and Simulation". The KIPS Transactions:PartC. 18C (5): 343–360. doi:10.3745/kipstc.2011.18c.5.343. ISSN 1598-2858.
  116. ^ Anghel, Ionut; Cioara, Tudor; Salomie, Ioan; Dinsoreanu, Mihaela; Rarau, Anca (2023-01-13). "A SELF-CONFIGURING MIDDLEWARE FOR MANAGING CONTEXT AWARENESS": 131–138. doi:10.5220/0002233701310138. ISBN 978-989-674-008-5. {{cite journal}}: Cite journal requires |journal= (help)
  117. ^ Stockebrand, Benedikt (2007). IPv6 in practice : a Unixer's guide to the next generation Internet. Berlin: Springer. ISBN 978-3-540-24524-7. OCLC 84839100.
  118. ^ Han, Lichao. Path construction under MAC address randomization (Thesis). The Hong Kong University of Science and Technology Library.
  119. ^ Pradana, Dio Aditya; Budiman, Ade Surya (2021-06-30). "The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack". IJID (International Journal on Informatics for Development). 10 (1): 38–46. doi:10.14421/ijid.2021.2287. ISSN 2549-7448.
  120. ^ Aitchison, Ron (2005). Pro DNS and BIND. Berkeley, CA: Apress. ISBN 1-59059-494-0. OCLC 63686922.
  121. ^ Gont, F.; Liu, W.; Van de Velde, G. (2015-08). "DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  122. ^ Zhao, W.; Schulzrinne, H.; Guttman, E.; Bisdikian, C.; Jerome, W. (2004-07). "Remote Service Discovery in the Service Location Protocol (SLP) via DNS SRV". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  123. ^ Smarr, L. (2005). "High resolution multimedia in an ultra bandwidth world". Seventh IEEE International Symposium on Multimedia (ISM'05). Irvine, CA: IEEE: 180–180. doi:10.1109/ISM.2005.65. ISBN 978-0-7695-2489-4.
  124. ^ Software-implemented hardware fault tolerance. O. Goloubeva. New York: Springer. 2006. ISBN 0-387-26060-9. OCLC 76834907.{{cite book}}: CS1 maint: others (link)
  125. ^ Loveless, John (2017). IP multicast. Volume I, Cisco IP multicast networking. Ray Blair, Arvind Durai. Indianapolis, Indiana. ISBN 978-0-13-439957-7. OCLC 960872370.{{cite book}}: CS1 maint: location missing publisher (link)
  126. ^ Phelan, T. (2008-05). "Datagram Transport Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP)". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  127. ^ McCarthy, A.; Jarvis, A.; Binucci, N. (2005-01-01). "Multimedia broadcast multicast services: concept & capabilities": 63–66. doi:10.1049/cp:20050194. ISSN 2005-0194. {{cite journal}}: Cite journal requires |journal= (help)
  128. ^ 1952-, Kempf, James, (1999). Service location protocol for enterprise networks : implementing and deploying a dynamic service finder. Wiley. OCLC 183262924. {{cite book}}: |last= has numeric name (help)CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link)
  129. ^ Guttman, E. (2001-05). "Service Location Protocol Modifications for IPv6". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  130. ^ Loveless, John (2017). IP multicast. Volume I, Cisco IP multicast networking. Ray Blair, Arvind Durai. Indianapolis, Indiana. ISBN 978-0-13-439957-7. OCLC 960872370.{{cite book}}: CS1 maint: location missing publisher (link)
  131. ^ "Optical Packet Switches", Broadband Packet Switching Technologies, New York, USA: John Wiley & Sons, Inc., pp. 279–335, retrieved 2023-01-13
  132. ^ "Voice Packets Jitter with Large Data Packets", VoIP Voice and Fax Signal Processing, Hoboken, NJ, USA: John Wiley & Sons, Inc., pp. 406–413, retrieved 2023-01-13
  133. ^ Siqueira, Adriano A. G. (2011). Robust control of robots : fault tolerant approaches. Marco H. Terra, Marcel Bergerman. London: Springer. ISBN 978-0-85729-898-0. OCLC 755080937.
  134. ^ Riva, A.; Bellazzi, R.; Montani, S. (1998). "A knowledge-based Web server as a development environment for Web-based knowledge servers". IEE Colloquium on Web-Based Knowledge Servers. IEE. doi:10.1049/ic:19980533.
  135. ^ "AN ECOREGIONAL STRATEGY TOWARDS A FAULT-TOLERANT HUMAN-ENVIRONMENT RELATIONSHIP", Human Ecology, Routledge, pp. 311–321, 2002-11-01, retrieved 2023-01-13
  136. ^ Snader, Jon C. (2005). VPNs illustrated : tunnels, VPNs, and IPsec. Upper Saddle River, NJ: Addison-Wesley. ISBN 978-0-321-24544-1. OCLC 74459669.
  137. ^ "Service Quality Requirements", Implementing Service Quality in IP Networks, Chichester, UK: John Wiley & Sons, Ltd, pp. 9–52, retrieved 2023-01-13
  138. ^ Bauer, Eric (2013). Service quality of cloud-based applications. Randee Adams. Hoboken, New Jersey. ISBN 978-1-118-76328-5. OCLC 852745802.{{cite book}}: CS1 maint: location missing publisher (link)
  139. ^ Yi, Peng (2008-10-21). "A Distributed DiffServ Supporting Scheduling Algorithm: A Distributed DiffServ Supporting Scheduling Algorithm". Journal of Software. 19 (7): 1847–1855. doi:10.3724/SP.J.1001.2008.01847. ISSN 1000-9825.
  140. ^ Black, Uyless D. (2000). QOS in wide area networks. Upper Saddle River, N.J.: Prentice Hall PTR. ISBN 0-13-026497-0. OCLC 42935698.
  141. ^ "Comparative Analysis of QoS Routing Protocols in MANETS: Unicast & Multicast". International Journal of Science and Research (IJSR). 4 (11): 1314–1319. 2015-11-05. doi:10.21275/v4i11.sub159056. ISSN 2319-7064.
  142. ^ Alpaydin, Ethem (2021). Machine learning (Revised and updated edition ed.). Cambridge, Massachusetts. ISBN 978-0-262-36536-9. OCLC 1256587594. {{cite book}}: |edition= has extra text (help)CS1 maint: location missing publisher (link)
  143. ^ Myers, Chris (2010-10-12). "Implementation of SBML Level 3 Support within iBioSim". Nature Precedings. doi:10.1038/npre.2010.4988.1. ISSN 1756-0357.
  144. ^ "address space", SpringerReference, Berlin/Heidelberg: Springer-Verlag, retrieved 2023-01-13
  145. ^ Park, Kihong; Willinger, Walter, "Self-Similar Network Traffic: An Overview", Self-Similar Network Traffic and Performance Evaluation, New York, USA: John Wiley & Sons, Inc., pp. 1–38, retrieved 2023-01-13
  146. ^ Ido., Dubrawsky, (2007). How to cheat at securing your network. Syngress. ISBN 978-0-08-055864-6. OCLC 233541332.{{cite book}}: CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link)
  147. ^ Christopher., Lampton, (1998). The World Wide Web. Watts. ISBN 0-531-20262-3. OCLC 60152289.{{cite book}}: CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link)
  148. ^ Cohen, Fred (1999-04). "Managing network security: Simulating network security". Network Security. 1999 (4): 6–13. doi:10.1016/S1353-4858(00)80009-4. {{cite journal}}: Check date values in: |date= (help)
  149. ^ Swan, Melanie (2021). Blockchain. [S.l.]: Helion. ISBN 978-83-283-5921-5. OCLC 1228540449.
  150. ^ WANG, Jun-yi; WU, Wei-ling (2010-09-07). "Network utility maximization of coded packet network under delivery contracts constraint". Journal of Computer Applications. 30 (8): 2224–2227. doi:10.3724/sp.j.1087.2010.02224. ISSN 1001-9081.
  151. ^ Laseter, Timothy M. (2012). Internet retail operations : integrating theory and practice for managers. Elliot Rabinovich (1st edition ed.). Boca Raton, Fla. ISBN 0-429-25068-1. OCLC 1295596784. {{cite book}}: |edition= has extra text (help)CS1 maint: location missing publisher (link)
  152. ^ Combes, Jean-Michel (2013-05). "Sécurité IPv6 - Adressage et auto-configuration". Réseaux Télécommunications (in French). doi:10.51257/a-v1-te7506. {{cite journal}}: Check date values in: |date= (help)
  153. ^ Bradley, A. C. (1991). Peripherals for computer systems. Basingstoke: Macmillan. ISBN 0-333-49642-6. OCLC 21521083.
  154. ^ Loveless, John (2017). IP multicast. Volume I, Cisco IP multicast networking. Ray Blair, Arvind Durai. Indianapolis, Indiana. ISBN 978-0-13-439957-7. OCLC 960872370.{{cite book}}: CS1 maint: location missing publisher (link)
  155. ^ "packet-switched data transmission service", SpringerReference, Berlin/Heidelberg: Springer-Verlag, retrieved 2023-01-13
  156. ^ "Representative Standards Organizations: the OSI Reference Model", Understanding Data Communications, Chichester, UK: John Wiley & Sons, Ltd, pp. 159–181, retrieved 2023-01-13
  157. ^ Gupta, Sonalika. Quality of Service (QoS) in Software-as-a-Service (SaaS) (Thesis). San Jose State University Library.
  158. ^ "Understanding the Internet Protocol: The IP in TCP/IP", New Directions in Internet Management, Auerbach Publications, pp. 157–168, 2001-10-18, retrieved 2023-01-13
  159. ^ Kaplan, Jerry (2016-11-24), "Defining Artificial Intelligence", Artificial Intelligence, Oxford University Press, retrieved 2023-01-13
  160. ^ Swan, Melanie (2021). Blockchain. [S.l.]: Helion. ISBN 978-83-283-5921-5. OCLC 1228540449.
  161. ^ Stafford, Matthew (2004). Signaling and switching for packet telephony. Boston: Artech House. ISBN 1-58053-737-5. OCLC 56985819.
  162. ^ "network failure", SpringerReference, Berlin/Heidelberg: Springer-Verlag, retrieved 2023-01-13
  163. ^ "Supervised Learning", Neural Smithing, The MIT Press, 1999, retrieved 2023-01-13
  164. ^ Alpaydin, Ethem (2021). Machine learning (Revised and updated edition ed.). Cambridge, Massachusetts. ISBN 978-0-262-36536-9. OCLC 1256587594. {{cite book}}: |edition= has extra text (help)CS1 maint: location missing publisher (link)
  165. ^ "Table 1: Packet delivery rate". dx.doi.org. Retrieved 2023-01-13.
  166. ^ Gontarev, V. I. (1975). "[Objectives of public health economics]". Zdravookhranenie Kirgizii (4): 47–50. ISSN 0132-8867. PMID 1928.
  167. ^ Chen, Chao; Chen, Zesheng (2007-09). "Routing Different Traffic in Deep Space Networks". 2007 International Workshop on Satellite and Space Communications: 237–241. doi:10.1109/IWSSC.2007.4409423. {{cite journal}}: Check date values in: |date= (help)
  168. ^ Woo, Richard (2007-09). "Space weather and deep space communications: DEEP SPACE COMMUNICATION". Space Weather. 5 (9): n/a–n/a. doi:10.1029/2006SW000307. {{cite journal}}: Check date values in: |date= (help)
  169. ^ Yang, Sung-Moon Michael (2019). Modern Digital Radio Communication Signals and Systems. Cham, Switzerland. ISBN 978-3-319-71568-1. OCLC 1038796841.{{cite book}}: CS1 maint: location missing publisher (link)
  170. ^ Lampton, Christopher (1997). Home page : an introduction to Web page design. New York: Franklin Watts. ISBN 0-531-20255-0. OCLC 35526274.
  171. ^ Robinson, P. (1992-10). "Suggestion for New Classes of IP Addresses". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  172. ^ Rooney, Timothy (2010). Introduction to IP address management. [Piscataway, NJ]: IEEE. ISBN 978-1-118-07381-0. OCLC 714797080.
  173. ^ Rooney, Timothy (2010). Introduction to IP address management. [Piscataway, NJ]: IEEE. ISBN 978-1-118-07381-0. OCLC 714797080.
  174. ^ DeKok, A. (2014-09). "Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  175. ^ Postel, Jon (1979-02-01). "Internet Datagram Protocol Specification. Version 4". Fort Belvoir, VA. {{cite journal}}: Cite journal requires |journal= (help)
  176. ^ "Packet Switched Technologies", Next Generation Network Services, Chichester, UK: John Wiley & Sons, Ltd, pp. 53–84, retrieved 2023-01-13
  177. ^ Khondoker, Rahamatullah (2016). Description and selection of communication services for service oriented network architectures. Wiesbaden. ISBN 978-3-658-12742-8. OCLC 949884279.{{cite book}}: CS1 maint: location missing publisher (link)
  178. ^ Ng, Eugene; Alfa, Attahiru Sule (2007-05). "Optimizing Bandwidth Allocation of Different Traffic Classes for Traffic between an ISP and a Future Home Area Network". The Third Advanced International Conference on Telecommunications (AICT'07): 2–2. doi:10.1109/AICT.2007.35. {{cite journal}}: Check date values in: |date= (help)
  179. ^ Park, Kihong; Willinger, Walter, "Self-Similar Network Traffic: An Overview", Self-Similar Network Traffic and Performance Evaluation, New York, USA: John Wiley & Sons, Inc., pp. 1–38, retrieved 2023-01-13
  180. ^ "Wireless Physical Layer Network Coding: a Gentle Introduction", Wireless Physical Layer Network Coding, Cambridge University Press, pp. 15–38, retrieved 2023-01-13
  181. ^ Network control and engineering for QoS, security and mobility, IV : Fourth IFIP International Conference on Network Control and Engineering for QoS. Security, and Mobility, Lannion, France, November 14-18, 2005. Dominique Gaïti. New York: Springer. 2007. ISBN 978-0-387-49690-0. OCLC 187012263.{{cite book}}: CS1 maint: others (link)
  182. ^ Guy, Donald. Simulation of flow control in a transparent intelligent network (Thesis). Carleton University.
  183. ^ Kim, Jeong-Su (2011-10-31). "IPv6 Migration, OSPFv3 Routing based on IPv6, and IPv4/IPv6 Dual-Stack Networks and IPv6 Network: Modeling, and Simulation". The KIPS Transactions:PartC. 18C (5): 343–360. doi:10.3745/KIPSTC.2011.18C.5.343.
  184. ^ Breen, Richard (2013). Class stratification : a comparative perspective. David B. Rottman. London. ISBN 978-1-315-83511-2. OCLC 1082222397.{{cite book}}: CS1 maint: location missing publisher (link)
  185. ^ "bit-sequence independent", SpringerReference, Berlin/Heidelberg: Springer-Verlag, retrieved 2023-01-13
  186. ^ Robinson, P. (1992-10). "Suggestion for New Classes of IP Addresses". {{cite journal}}: Check date values in: |date= (help); Cite journal requires |journal= (help)
  187. ^ Dryburgh, Lee (2005). Signaling System No. 7 (SS7/C7) : protocol, architecture, and services. Jeff Hewett. Indianapolis, IN: Cisco. ISBN 978-1-58705-040-4. OCLC 70791995.
  188. ^ Dryburgh, Lee (2005). Signaling System No. 7 (SS7/C7) : protocol, architecture, and services. Jeff Hewett. Indianapolis, IN: Cisco. ISBN 978-1-58705-040-4. OCLC 70791995.
  189. ^ Seth, Sameer (2008). TCP/IP architecture, design and implementation in Linux. M. Ajaykumar Venkatesulu. Hoboken, N.J.: Wiley. ISBN 978-0-470-37783-3. OCLC 352837279.
  190. ^ "IP Routing", TCP/IP Architecture, Design, and Implementation in Linux, Hoboken, NJ, USA: John Wiley & Sons, Ltd, pp. 499–589, 2008-01-29, doi:10.1002/9780470377833.ch14, ISBN 978-0-470-37783-3, retrieved 2023-01-13
  191. ^ Information technology. UPnP Device Architecture, BSI British Standards, doi:10.3403/30326593, retrieved 2023-01-13